Chapter 7
Identity and Access Management
IN THIS CHAPTER
Controlling access and designing an identification and authentication strategy
Federating identity and managing authorization mechanisms
Managing the identity and access lifecycle and implementing authentication systems
Identity and access management (IAM) is often the first — and sometimes the only — line of defense between adversaries and sensitive information. In fact, in the modern cloud era, with ubiquitous mobile computing and anywhere, anytime access to applications and data, many security practitioners now refer to identity as “the new perimeter.” Security professionals must have a thorough understanding of the concepts and technologies involved. This domain represents 13 percent of the CISSP certification exam and is composed of the following exam objectives:
- 5.1 Control physical and logical access to assets
- 5.2 Design identification and authentication strategy
- 5.3 Federated identity with a third-party service
- 5.4 Implement and manage authorization mechanisms
- 5.5 Manage the identity and access provisioning lifecycle
- 5.6 Implement authentication systems
Control Physical and Logical Access to Assets
IAM is a collection ...
Get CISSP For Dummies, 8th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.